THE EFFECT OF TRUST ON INFORMATION DIFFUSION IN ONLINE SOCIAL NETWORKS

Size: px
Start display at page:

Download "THE EFFECT OF TRUST ON INFORMATION DIFFUSION IN ONLINE SOCIAL NETWORKS"

Transcription

1 THE EFFECT OF TRUST ON INFORMATION DIFFUSION IN ONLINE SOCIAL NETWORKS Zhijun Yan, School of Management and Economics, Beijing Institute of Technology, Beijing, China, Wenyang Liu, School of Management and Economics, Beijing Institute of Technology, Beijing, China, Yaohui Pan, School of Management and Economics, Beijing Institute of Technology, Beijing, China, Tianmei Wang, School of Information, Central University of Finance and Economics, Beijing, China, Abstract online social networks have a explosive growth in recent years and they provide a perfect platform for information diffusion. Many models have been given to explore the information diffusion procedure and its dynamics. But the trust relationship and memory effect are ignored. Based on the complex network theory, The information diffusion model is proposed and the network users, considered as agents, are classified into susceptible, infected and recovered individuals. The users behaviour rule and diffusion process are designed. The proposed agent-based model is tested by simulation experiments in four different complex networks: regular network, small world network, random network and scale-free network. Moreover, the effect of four immunization strategies are explored. The research results show that the influence of users trust relationship on different networks is varied, and the vertex weight priority immunization strategy is the best one in all four networks. Key words: information diffusion, trust, immunization strategy, online social networks

2 1. INTRODUCTION With the rapid development of internet and communication technology, China has made significant achievements in the information industry. Now the Internet and mobile communication network is becoming an essential part of people s daily life. By the end of year 2012, the number of Internet users (a.k.a. netizens ) in China has reached 564 million, and the number of cellphone netizens has reached 420 million (CNNIC 2013). As the fast development of Web2.0 technology, various online venues (e.g., forums, social networking sites, blogs, and so on) are emerging to provide users new convenient channels for mass information propagation. The global reach of the Internet inspires a far-reaching and astonishingly rapid movement of digital word of mouth, thereby changing the information diffusion patterns and users knowledge-acquisition behaviours (Chang, Oh et al. 2010). And this diffusion procedure influence internet users decision and action significantly (Hinz and Spann 2010). Given the importance of information diffusion in decision-making process and human behaviour selection, it is worth exploring the diffusion influencing factors and understanding the dynamics of information diffusion. Information diffusion has been extensively studied in the field of epidemiology, sociology, system science, marketing and other areas. Biology and epidemiology has conducted in-depth study on epidemic spreading in early time, and the classical susceptible-infected-susceptible (SIS) model and susceptible infected recovered (SIR) model are proposed (Tebbens and Thompson 2009). Many marketing scholars explore the information diffusion process in product marketing and explore how the word-of-mouth works. Some research predict that social structure play a critical role in the spread of a viral message (Bampo, Ewing et al. 2008). And the influence factors on the information diffusion are investigated. The proposed factors include informational properties, network characteristic, social reinforcement, user characteristics, and so on (Zhou, Liu et al. 2007; Lü, Chen et al. 2011; Han and Niu 2013; Song, Hwang et al. 2013). Users on social networking sites build and expand their social relationships with other users of similar interests and preferences. Social tie is very important for users to decide whether they adopt their neighbours suggestions or not (Zeng and Wei 2013). And trust relationship is one kind of social ties. Then users would like to accept their trusted neighbours message and retransmit them (Kim and Tran 2013). Moreover, previous contacts could impact the information spreading in current time (Dodds and Watts 2004). Such memory effects can improve the information acceptance probability directly, or enhance the tie strength between transmitter and receivers and also influence the spreading process. At the same time, the influence of memory effect also exists decay (Lü, Chen et al. 2011), namely the effect of previous contacts will decrease as the time goes on. Different from previous studies, our study take both trust relationship and memory effect into consideration. Our research employs these two variables and other related variables as model parameters and explore their influence on the information diffusion dynamics. Considering the individual heterogeneity of users in online social network, we propose an agent-based model to investigate the dynamics of information diffusion (Rahmandad and Sterman 2008).

3 The difference of the strength of trust relationship on the diffusion process is analyzed. And four different immunization strategies to control negative information are compared in different network structure. Our study contributes to the knowledge on information diffusion dynamics and provides managerial implications regarding the strategic utilization of online social networks for promoting positive information and blocking negative information. There are three-fold novel contributions of this study. First, we propose a variant of the SIR model for information diffusion, which incorporate several new diffusion factors which the standard SIR model doesn t include. Second, the simulation experiment show that in the small initial transmitting probability, the information spreads more effectively in regular networks than other networks. And high level trust relationship only influence the information diffusion under certain circumstance. Furthermore, we have analyzed the effect of four immunization strategies on different networks and provide insights on the blocking of information diffusion in online social networks. The rest of the paper will be organized as follows. Section 2 introduces the related work on information diffusion model and the limitations of existing approaches. Then, we propose a new information diffusion model in Section 3. Section 4 describes the experiment result of the proposed model, followed by the major findings. Finally, the paper will discuss the implications of the study and conclude the paper in Section RELATED WORKS By definition, information diffusion means utilizing possible channels for propagation without physical contact. The disseminated content may include viewpoints, rumours, knowledge, product marketing information, etc (Lü, Chen et al. 2011). As one of the most important form of information, knowledge dissemination wins a large range of scholars concern. The research topics include the efficiency of knowledge spreading, the direction of knowledge flows, the influence of knowledge spreading on organizational performance, and the influencing factors on knowledge spreading (Tsai 2008; Kaše, Paauwe et al. 2009; Tortoriello, Reagans et al. 2012). Multiple approaches such as cellular automaton, complex network models, questionnaire survey, and empirical study methods were used to analyze the impact of domain structure, aggregation and range of network and working mechanism on knowledge dissemination. The spread of rumours is also a field of great interest in information diffusion. Equipped with complexity theory and simulation techniques, researchers analyzed the rumour spreading process, its relevant factors, and immunization and control strategies. Wang and Chen (2012) discussed the impact of multiple parameters, like rumour property and network structure, on the process of rumour propagation. Zhou (2007) studied the rumour propagation in complex networks using the SIR model. The mean-field theory is applied and the results show that the number of the total final infected nodes depends on the network topological structure. Huang (2011) proposed an immunization strategy against rumour spreading on small world networks.

4 Regarding the spread of public opinion or viewpoint in online social network sites, Han (2013) proposed an information propagation agent-based model for online social network. The simulation results showed that the number of initial infected nodes has a certain impact on the information propagation speed, but it doesn t affect the number of final infected and susceptible nodes. Son (2013) considered message characteristics and user identity as information diffusion factors and investigates their impact on information diffusion volume and speed in online social network. Song (2013) found that Informational properties, individual characteristic variables, as well as network characteristic variables, have a significant influence on the verbal acceptance. Qian (2012) built a weibo public opinion propagation model based on the traditional epidemic model, and further conducted an empirical study using data from Sina weibo. Regarding information diffusion dynamics, Lü (2011) proposed an information spreading model and studied the dynamics process of information spreading. The model emphasized the essential difference between information spreading and epidemic spreading. The simulation results showed that the small-world networks could yield the most effective information spreading. And several other articles also explored the dynamics of information diffusion process (Yang, Yao et al. 2010). Up to now, previous studies rarely take the influence of trust relationship among members (nodes) on information diffusion into consideration, and the memory decaying effect that takes place after receiving information is also ignored. However, trust is very important for people s relationship and can reduce uncertainty and hesitation in the communication process. It is a valuable mechanism to avoid opportunism actions and enhance cooperation. At the organizational level, trust relationship can directly boost the level of satisfaction and commitment, thus increasing organizational performance (Ye, Chen et al. 2008). Therefore, trust is one of major influencing factors on information propagation, and it will directly affect the information diffusion speed and depth. Meanwhile, previous contacts will influence the information spreading process in current time. The spreading speed and ranged are affect by such memory effects. At the same time, information receiver has the memory decay effect. The longer the information is received, the less the receiver is interested in. In other words, information will play a less and less important role as time goes on (Lü, Chen et al. 2011). As a major research tool in transmission dynamics of complex network, epidemic model is being applied to a wide range of areas: computer virus control, public opinion analysis, information diffusion, behaviour prediction, social management, and so on (Newman 2003; Bampo, Ewing et al. 2008; Zhao, Cui et al. 2012). Based on epidemic model, this article presents an information diffusion model, which treats the propagation process as information being communicated among multiple agents in an agent-based social network. We further analyze the influence of trust relationship on networks with different topological structure, and discuss the advantages and disadvantages of different immunization strategies in the process of information diffusion.

5 3. INFORMATION DIFFUSION MODEL 3.1 Model Description The process of information diffusion on online social networks can be resolved as information dissemination among different network agents. Each network node represents an individual (or agent) in the network community, and each network edge (or link) represents the neighbour relationship between two network nodes. Individuals will transmit the receiving information to neighbours according to their behaviour rules. And they will record their state, sending and receiving information behaviour in each step. We divide individuals (referred to as nodes below) into 3 categories according to their states: Susceptible Node, Infected Node and Recovered Node. The susceptible node has not yet been infected, but is prone to be infected. That is, the node has not received the information yet, but will receive it when its neighbours transmit the information. The infected node has received information, but has not transmitted it yet. If the node receives the same information again, the node will calculate the transmitting probability according to the times it receives this information. The transmitting probability will be higher as the increase of receiving times. After the node transmit the information to its neighbours, its state will be changed. The recovered node has received the information and transmitted it to neighbours. For simplicity, we assume the recovered node isn t interested in the same information and will not be affected by the same information. A susceptible node will become infected once receiving information from its infected neighbours, and an infected node will become recovered when it performs a transmission. Assume the average probability from susceptible state to infected sate is α, and the average probability from infected state to recovered state is β. Then the network information diffusion model can be described as: di = αs( t) βi( t) dt dr = βi( t) dt (1) ds = αs( t) dt N = S( t) + I( t) + R( t) In formula (1), S(t) is the number of susceptible nodes, I(t) is the number of infected nodes, and R(t) is the number of recovered nodes. The total number of nodes in the network is N. we assume the network is composed of a fixed set of nodes and edges, thus the total number of nodes N remain unchanged, and there is no adding or removing of nodes during the entire process. Formula (1) presents an information diffusion model based on the classic epidemic model. However, this model doesn t consider the difference among network nodes. In real world, the

6 individual will have different transmitting probability because of the personal characteristics. The probability whether a node transmits the receiving information or not depends on various factors: the number of times it receives information, information strength, the social effect, memory effect, neighbour relationship, etc (Lü, Chen et al. 2011). First of all, the more times the node receives the same information, the more probable it transmits the receiving information. Secondly, the node will receive the same information from different neighbours. But the information strength will vary greatly because of the diversified relationship with different neighbours. High information strength will bring high transmitting probability. We think information strength is related with trust relationship among network nodes and define it as a function of trust relationship. Based on weighted network, the trust relationship can be modeled by edge weight. A large edge weight indicates a high level of trust between two neighbouring nodes, therefore resulting in a high probability to retransmit the receiving information. Thirdly, the transmitting probability is also associated with the information s social awareness, which represents how much the information get social concern. The information with high social concern will have more impact on information diffusion. Additionally, each node will have memory decay effect and the information received in the time t-1 will have less influence in the time t. Thus, the transferring probability β it of node i from infected state to recovered state is defined as (Lü, Chen et al. 2011): ( ' mit 1)* hit b* e β it = 1 (1 λ ) (2) In formula(2), b represents the information social effect coefficient, λ=β 1 (0 λ 1) is the initial transmitting probability that a node transmit the receiving information for the first receipt, m it represents the times a node receive the information by time t, h it is the cumulative amount of information strength, and e is the natural logarithm. The second item on the right side of formula(2) denotes the probability that node i will not transmit the information after it receive the information for m it times and the accumulating information strength is h it. When m it =1 and b=1, β it equals the initial transmitting probability λ. The transferring probability α jt of node j from susceptible state to infected state is relevant to its neighbours information transmission action. The probability α jt can be defined as: C( j) α = 1 (1 ) (3) jt β rt r= 1 In formula(3), C(j) denotes the set of node j s neighbours, C(j) denotes the number of node j s neighbours. formula (3) indicates that whether node j transforms to infected state depends on whether its neighbours transmit the information. Once a neighbour performs transmission, node j becomes infected, and the more its neighbours perform transmission, the more frequently and abundantly node j receives the information. 3.2 Information Diffusion Process Based on the diffusion model proposed above, we further design the node behaviour rules in

7 the information diffusion process and explore the diffusion result of different network structure through simulation experiment. The information diffusion process is given as follows: (1) Initially, a seed node is chosen randomly and its state is set as recovered, indicating that the seed has transmitted information to its neighbours. The seed s neighbours state are set as I (infected), and all other nodes state in the network are set as S (susceptible). (2) Different operations are conducted according to the node state at every moment. (2.1) If the node is in the infected state, and it receives information from neighbours, then: (2.1.1) Calculate the cumulative amount of information strength as follows: h δ (4) t = hnew + ht 1 w h = (5) new ij j C(i) < w > In formula(4), h t-1 denotes the cumulative amount of information strength by time t-1, and δ denotes the memory decay effect coefficient (0 δ 1), meaning that the influence the information strength on information diffusion decays as time goes on. From this formula, it is clear that the total impact of the same information, which is represented by h t, is increasing. But the impact of last receiving behaviour is decreasing. In formula(5), h new denotes the information strength at time t, which depends on the transmitting neighbour and their trust relationship. C(i) represents the set of node i s neighbours that transmits information to node i. w ij denotes the weight of the edge between node i and j (j transmits information to i), and represents the level of trust between i and j. <w> is the average edge weight in the network. (2.1.2) Calculate the cumulative number of times that a node has received information by time t: m δ (6) t = mnew + mt 1 In formula(6), m t-1 denotes the cumulative number of times the node has received information by time t-1, and δ is the memory decay effect coefficient. m new denotes the number of times the node receives information at time t, where each neighbour s transmission is counted as once. Formula (6) indicates that m t implies the effect of information transmission times. The effect of information transmission taking place at time t-1 will decrease as δ times as much influence at time t. (2.1.3) Decide whether to transmit the information or not according to the probability β it. If the transmission takes place, the node state is changed to recovered. (2.2) If the node is in the susceptible state, it will be changed to infected state if it receives information from its neighbours. And the information strength and number of transmission times will be recorded. (2.3) If a node is in the recovered state, then nothing happens. (3) Repeat the step two until no transmission is possible in the whole network.

8 Following the above process, the network nodes will transform between different states during the information diffusion process, and a stable final state will be reached. 3.3 Four Network Structures The information diffusion model is applied in four complex network models: regular network, small world network, random network and scale-free network. And each network model has the same node degree k. In regular network, each node has the same degree, and the clustering coefficient and average path length are big. In random network, the node degree follows the Poisson distribution which brings a smaller clustering coefficient and average path length. Regular network and random network represent two extreme situations. And the small world network is a special network between them. The scale-free network is proposed by Barabasi in the study of hyperlink relationship among website pages. In this type of network, the node degree follows the power-law distribution. We explore the influence of trust relationship on information diffusion in these four different network structures. Assume a network G={A, E}, where A denotes the set of agents (nodes), and E denotes the set of edges. Each edge e ij ={a i, a j, w ij } represents an undirected link between node a i and a j with a weight of w ij. Methods to generate different network structures are given as follows (Lü, Chen et al. 2011; Wang, Li et al. 2012): (1) Regular network. Each node is linked to its k nearest neighbours, that is, its k/2 nearest nodes clockwise and anti-clockwise. (2) Small world network(sw). This network structure is generated by randomly rewiring a regular network by keeping the node degree unchanged. The edge-based rewiring method is applied to generate small world network. We randomly choose a pair of edges A-B and C-D from the original regular network, then the two edges are relinked to be A-D and B-C. If the edge A-D or B-C already exists, randomly select a new pair of edges. Repeat the rewiring procedure for p E (0<p<1) times to generate a small world network, where p is the randomness of the network. (3) Random network. When p 1, we will obtain a random network by repeating the above rewiring procedures. (4) Scale-free network(ba). At first, we generate an initial network with n 0 nodes and k*n 0 /2 edges. Then adding a new node to the network, and the new node will link to k/2 existing nodes. The adding operation is repeated until the total node number in the network is N. The probability that the new node connects to the existing node is proportional to the existing node s degree. For example, the probability that an existing node with degree k i being chosen as the new node s neighbour is k i / k i. Meanwhile, Each kind of networks will include two different instances according to the edge weight distribution. High-weight network represents a high level of trust among nodes and low-weight network indicates a low level of trust among nodes.

9 4.EXPERIMENT AND RESULT ANALYSIS 4.1 Simulation Platform Repast (Recursive Porous Agent Simulation Toolkit) is an agent-based modelling tool and adopted as the simulation platform. Repast is developed under the Swarm-like software architecture, with powerful features, good performance and a user-friendly interface. Highly customized models can be constructed by inheriting base classes and interfaces provided by Repast. And each agent in Repast can have their own behaviour rule and decision mechanism (Sabelli and Kovacevic 2006). In the simulation, let N=1000, n 0 =100 and k=6. The edge weight for high-weight networks are between 5 and 10, for low-weight networks are between 1 and 5. We denote by R the number of recovered nodes in the whole network. Larger R at the final state indicates broader information diffusion. All the simulation results are obtained by averaging over 500 independent realizations. 4.2 The Effect of Initial Transmitting Probability The influence of initial transmitting probability on the information diffusion in different network described in Figure 1. It illustrates the changing procedure of R value in four networks with different λ(λ=0.1, λ=0.2, λ=0.3). For the sake of brevity, we set b=1 and δ=0.9 in this analysis. Our result is similar to Centola (2010) and Lü (2011) s results. With small λ, regular networks have a faster and broader diffusion than random and small world networks, Figure 1 The effect of initial transmitting probability on information diffusion

10 but scale-free networks enjoy the largest diffusion speed in the early stage. As the increase of λ, information diffusion in small world and random networks is gradually faster and wider. And small world networks get the highest R value finally. Scale-free networks disseminate information fastest in the early stage because the hub nodes with large degree inspire diffusion significantly. However, most nodes degree are small, so the diffusion speed drops quickly after reaching the peak. 4.3 The Effect of Trust Relationship Trust is one of the basic factors in people s social activities. Individuals are willing to accept or adopt the suggestions from people they trust. This paper analyzes the influence of trust relationship on information diffusion and explores the difference of information diffusion in networks with different trust relationship. Figure 2 shows the number of recovered nodes as a function of initial transmitting probability λ in high-weight and low-weight networks. The parameters are b=1 and δ=0.9. For regular and small world networks, the enhancing of trust relationship has obvious influence on information diffusion. When λ is small, the range of information diffusion is limited in random and scale-free networks. And the enhancing of trust relationship make network nodes more prone to their neighbours behaviour. Thus the number of recovered nodes in high-weight networks is more than that of low-weight networks. When λ is large, however, the number of recovered nodes in different networks are similar, indicating that the effect of trust vanishes. For random networks, a high level of trust can only enhance the range of information diffusion significantly when λ belong to [0.1, 0.3] interval. Scale-free networks also have the similar situation. An increase in trust level can significantly improve the range Figure.2 The effect of trust on diffusion range

11 of information diffusion only when initial transmitting probability is small. In conclusion, the trust relationship will relatively influence information diffusion on random and scale-free networks only under certain circumstances, and the nodes own attributes play a more important role in the information diffusion process. Trust relationship between nodes also affects the speed of information diffusion. We define V t as a measure of diffusion speed: V (7) t = Rt Rt 1 V t denotes the increase of number of recovered nodes at time t compared to time t-1. Figure 3 shows diffusion speed in low-weight and high-weight networks across four different network structures. The parameters are λ=0.2, b=1 and δ=0.9. Figure.3 The effect of trust on diffusion speed In regular networks, information always spreads faster on high-weight networks than low-weight networks, which indicates that trust relationship has a stable influence on information diffusion. On small world networks, high-weight networks reach a diffusion speed peak and falls back to a relatively low level. But the diffusion speed is relatively stable in low-weight network. Random networks have the similar phenomenon with small world networks, but the dropping speed for high-weight networks is slower than that of small world networks. Thus, the influence of trust increasing on information diffusion is only lasting for a short time. On scale-free networks, both the diffusion speed of high-weight and low-weight network have an obvious peak value, which is the result from high-degree nodes. However, the increase of trust level raises the speed peak value of information diffusion in high-weight networks. After reaching the peak, the diffusion speed in both low-weight and high-weight scale-free network drops quickly to a relative stable value.

12 4.4 Immunization Strategies In the process of information diffusion, immunization strategies can be taken to control the propagation and prevent potential negative consequences. Common immunization strategies on weighted networks include random immunization, vertex weight priority immunization and weakened immunization (Ma, Li et al. 2010). Random immunization means randomly choosing a number of nodes to perform immunization, removing their links to neighbours so that they won t be affected. Vertex weight priority immunization prefers to immunize nodes with large strength, and remove their links to neighbours. Weakened immunization means randomly choosing a number of nodes to immunize, reducing their edges weights to 1/q instead of simply removing them. We tested the effects of four immunization strategies in our simulation, namely random immunization(random), vertex weight priority immunization(wp), randomly weakened immunization(rw) and vertex weight priority weakened immunization(ww). To keep the network structure unchanged during the simulation, the weight of the edges connecting to immunized nodes is set 0.01 for random immunization and vertex weight priority immunization. Figure 4 displays the percentage of recovered nodes as a function of immunization rate. The parameters are λ=0.2, b=1 and δ=0.9. It shows that vertex weight priority immunization is the most effective strategy on all four networks. For scale-free networks, vertex weight priority weakened immunization is the second best strategy, whereas random immunization is the second best strategy on regular, small world and random networks. This is because vertex weight priority weakened immunization can effectively immunize the hub nodes on scale-free networks. We also observe that vertex weight priority weakened immunization always performs better than Figure.4 The immunization strategies effect in four networks

13 randomly weakened immunization, and the value q doesn t have a significant influence on the final number of recovered nodes. However, the smaller q is, the more efficient the whole network is (Ma, Li et al. 2010). 5. CONCLUSIONS With the rapid development of social media, the Internet has become a major channel for information propagation and diffusion. It is well known that the information diffusion process is largely influenced by the number of neighbours and their relationship. Represented by different level of ties, the trust relationship is simulated in our proposed model and its influence on information diffusion is also explored. At the same time, the time decaying effect is normal phenomenon and no one is willing to spread news long time ago. That means the old information people received have a low probability to be transmitted and diffused. Social effects imply how much the society care about the information. It is stated that social effects play an important role in the propagation of opinions, news, innovations and fads. Our model also take the decaying effect and social effect into consideration. The simulation results show that under small initial transmitting probabilities, regular networks can spread information faster and broader than random network, which to some extent is similar with the result of Centola (2010) and Lü (2011). As the increasing of initial transmitting probability, small world networks perform best, and the information diffusion is better than random, regular and scale-free networks. At the same time, the results show that the strength of trust relationship can influence the information diffusion greatly only in some special circumstances. High level of trust in the network really inspire the range of information diffusion, but the effect among different network structures varies greatly. Furthermore, four immunization strategies are applied to block the negative information diffusion in the network. The simulation results indicate that the vertex weight priority immunization is the most effective immunization strategy on all four kinds of network structures. Our study have several implications on research and practice. Our study enriches the current knowledge about information diffusion. It incorporate several new factors into the information diffusion model and examine the diffusion dynamics. The research result supports some conclusions of several recent works and also gives us some new insights on the diffusion dynamics. For example, our results suggest that high level of trust relationship can only play an important role in some cases. Our results are also helpful for social network manager. Although the information diffusion is affected normally by people s disposition to sending message, it is also influenced by several other features. Small world networks can mostly spread information faster and broader. Improving mutual trust relationship can help motivate the information diffusion but it will not be effective all the time. Thus the network manager should apply other technique to encourage the information diffusion. In order to block negative information diffusion (e.g. rumour), vertex weight priority immunization strategy will be the first option for network manager. There are several limitations in the study that should be noted. Firstly, although we incorporate the memory decay and social effect into consideration, we didn t analyze the

14 influence of the memory decay and social effect in detail. For example, how the memory decay coefficient δ affect the final number of recovered nodes. Secondly, the interaction effect of trust relationship, memory decay and social effect is missing in the study. Thirdly, agent-based model and simulation method are applied to examine the impact of individual heterogeneity and different network topologies, but we lack the empirical data from real online social networks to verify our result. Further research can be conducted in those directions to expand the current research. ACKNOWLEDGEMENTS This research is supported by the National Natural Science Foundation of China (Award #: , , ), Program for New Century Excellent Talents in University (Award #. NCET ) and National Key Technology Support Program (Award #: 2013BAH16F00). References Bampo, M., M. T. Ewing, et al. (2008). The effects of the social structure of digital networks on viral marketing performance. Information Systems Research, 19(3): Centola, D. (2010). The spread of behavior in an online social network experiment. Science, 329(5996): Chang, R. M., W. Oh, et al. (2010). A network perspective of digital competition in online advertising industries: A simulation-based approach. Information Systems Research, 21(3): CNNIC. (2013, ). The 31st china internet development statistic report. Retrieved , from Dodds, P. S. and D. J. Watts (2004). Universal behavior in a generalized model of contagion. Physical Review Letters, 92(21): Han, X. and L. Niu (2013). On charactering of information propagation in online social networks. Journal of Networks, 8(1): Hinz, O. and M. Spann (2010). Managing information diffusion in name-your-own-price auctions. Decision Support Systems, 49(4): Huang, J. and X. Jin (2011). Preventing rumor spreading on small-world networks. Journal of Systems Science and Complexity, 24(3): Kaše, R., J. Paauwe, et al. (2009). Hr practices, interpersonal relations, and intrafirm knowledge transfer in knowledge intensive firms: A social network perspective. Human Resource Management, 48(4): Kim, Y. S. and V. L. Tran (2013). Assessing the ripple effects of online opinion leaders with trust and distrust metrics. Expert Systems with Applications, 40(9): Lü, L., D.-B. Chen, et al. (2011). The small world yields the most effective information spreading. New Journal of Physics, 13(12): Ma, Y., H. Li, et al. (2010). Some research on weakened immunization for weighted network. Journal of Management Science in China, 13(10): Newman, M. E. (2003). The structure and function of complex networks. SIAM review, 45(2):

15 Qian, Y., N. Zhang, et al. (2012). The spread of public sentiment on micro-blogging undere mergencies. Journal of the China Society for Scientific and Technical Information, 31(12): Rahmandad, H. and J. Sterman (2008). Heterogeneity and network structure in the dynamics of diffusion: Comparing agent-based and differential equation models. Management Science, 54(5): Sabelli, H. and L. Kovacevic (2006). Biotic population dynamics and the theory of evolution. InterJournal Complex Systems, Son, I., D. Lee, et al. (2013). Understanding the effect of message content and user identity on information diffusion in online social networks. Pacific Asia Conference on Information Systems, Jeju Island, Korea. Song, K., S. Hwang, et al. (2013). The effects of social network properties on the acceleration of fashion information on the web. Multimedia Tools and Applications, 64(2): Tebbens, R. J. D. and K. M. Thompson (2009). Priority shifting and the dynamics of managing eradicable infectious diseases. Management Science, 55(4): Tortoriello, M., R. Reagans, et al. (2012). Bridging the knowledge gap: The influence of strong ties, network cohesion, and network range on the transfer of knowledge between organizational units. Organization Science, 23(4): Tsai, C. M. (2008). Integrating intra-firm and inter-firm knowledge diffusion into the knowledge diffusion model. Expert Systems with Applications, 34(2): Wang, C. and C. Chen (2012). Rumor propagation model based on complex network. System Engineering Theory &Practice, 32(1): Wang, X., X. Li, et al. (2012). Network science: An introduction. Beijing, Higher Education Press. Yang, J. M., C. Z. Yao, et al. (2010). A study of the spreading scheme for viral marketing based on a complex network model. Physica a-statistical Mechanics and Its Applications, 389(4): Ye, S., H. Chen, et al. (2008). An empirical analysis of factors influencing consumers online shopping. Forecasting, 27(4): Zeng, X. H. and L. Y. Wei (2013). Social ties and user content generation: Evidence from flickr. Information Systems Research, 24(1): Zhao, L., H. Cui, et al. (2012). Sir rumor spreading model in the new media age. Physica A: Statistical Mechanics and its Applications, 392(4): Zhou, J., Z. Liu, et al. (2007). Influence of network structure on rumor propagation. Physics Letters A, 368(6):

The Simulation Study of Spread and Evolution about Network Opinion on Education

The Simulation Study of Spread and Evolution about Network Opinion on Education Asian Social Science; Vol. 10, No. 10; 2014 ISSN 1911-2017 E-ISSN 1911-2025 Published by Canadian Center of Science and Education The Simulation Study of Spread and Evolution about Network Opinion on Education

More information

A Data Classification Algorithm of Internet of Things Based on Neural Network

A Data Classification Algorithm of Internet of Things Based on Neural Network A Data Classification Algorithm of Internet of Things Based on Neural Network https://doi.org/10.3991/ijoe.v13i09.7587 Zhenjun Li Hunan Radio and TV University, Hunan, China 278060389@qq.com Abstract To

More information

The Comparative Study of Machine Learning Algorithms in Text Data Classification*

The Comparative Study of Machine Learning Algorithms in Text Data Classification* The Comparative Study of Machine Learning Algorithms in Text Data Classification* Wang Xin School of Science, Beijing Information Science and Technology University Beijing, China Abstract Classification

More information

Failure in Complex Social Networks

Failure in Complex Social Networks Journal of Mathematical Sociology, 33:64 68, 2009 Copyright # Taylor & Francis Group, LLC ISSN: 0022-250X print/1545-5874 online DOI: 10.1080/00222500802536988 Failure in Complex Social Networks Damon

More information

CSCI5070 Advanced Topics in Social Computing

CSCI5070 Advanced Topics in Social Computing CSCI5070 Advanced Topics in Social Computing Irwin King The Chinese University of Hong Kong king@cse.cuhk.edu.hk!! 2012 All Rights Reserved. Outline Scale-Free Networks Generation Properties Analysis Dynamic

More information

Research on Design and Application of Computer Database Quality Evaluation Model

Research on Design and Application of Computer Database Quality Evaluation Model Research on Design and Application of Computer Database Quality Evaluation Model Abstract Hong Li, Hui Ge Shihezi Radio and TV University, Shihezi 832000, China Computer data quality evaluation is the

More information

A New Evaluation Method of Node Importance in Directed Weighted Complex Networks

A New Evaluation Method of Node Importance in Directed Weighted Complex Networks Journal of Systems Science and Information Aug., 2017, Vol. 5, No. 4, pp. 367 375 DOI: 10.21078/JSSI-2017-367-09 A New Evaluation Method of Node Importance in Directed Weighted Complex Networks Yu WANG

More information

An improved PageRank algorithm for Social Network User s Influence research Peng Wang, Xue Bo*, Huamin Yang, Shuangzi Sun, Songjiang Li

An improved PageRank algorithm for Social Network User s Influence research Peng Wang, Xue Bo*, Huamin Yang, Shuangzi Sun, Songjiang Li 3rd International Conference on Mechatronics and Industrial Informatics (ICMII 2015) An improved PageRank algorithm for Social Network User s Influence research Peng Wang, Xue Bo*, Huamin Yang, Shuangzi

More information

Adaptive Push-Then-Pull Gossip Algorithm for Scale-free Networks

Adaptive Push-Then-Pull Gossip Algorithm for Scale-free Networks Adaptive Push-Then-Pull Gossip Algorithm for Scale-free Networks Ruchir Gupta, Abhijeet C. Maali, Yatindra Nath Singh, Senior Member IEEE Department of Electrical Engineering, IIT, Kanpur {rgupta, abhicm,

More information

Small World Properties Generated by a New Algorithm Under Same Degree of All Nodes

Small World Properties Generated by a New Algorithm Under Same Degree of All Nodes Commun. Theor. Phys. (Beijing, China) 45 (2006) pp. 950 954 c International Academic Publishers Vol. 45, No. 5, May 15, 2006 Small World Properties Generated by a New Algorithm Under Same Degree of All

More information

Implementation of Parallel CASINO Algorithm Based on MapReduce. Li Zhang a, Yijie Shi b

Implementation of Parallel CASINO Algorithm Based on MapReduce. Li Zhang a, Yijie Shi b International Conference on Artificial Intelligence and Engineering Applications (AIEA 2016) Implementation of Parallel CASINO Algorithm Based on MapReduce Li Zhang a, Yijie Shi b State key laboratory

More information

Epidemic spreading on networks

Epidemic spreading on networks Epidemic spreading on networks Due date: Sunday October 25th, 2015, at 23:59. Always show all the steps which you made to arrive at your solution. Make sure you answer all parts of each question. Always

More information

An Application of Genetic Algorithm for Auto-body Panel Die-design Case Library Based on Grid

An Application of Genetic Algorithm for Auto-body Panel Die-design Case Library Based on Grid An Application of Genetic Algorithm for Auto-body Panel Die-design Case Library Based on Grid Demin Wang 2, Hong Zhu 1, and Xin Liu 2 1 College of Computer Science and Technology, Jilin University, Changchun

More information

Intelligent management of on-line video learning resources supported by Web-mining technology based on the practical application of VOD

Intelligent management of on-line video learning resources supported by Web-mining technology based on the practical application of VOD World Transactions on Engineering and Technology Education Vol.13, No.3, 2015 2015 WIETE Intelligent management of on-line video learning resources supported by Web-mining technology based on the practical

More information

Controllability of Complex Power Networks

Controllability of Complex Power Networks Network and Communication Technologies; Vol. 3, No. 1; 018 ISSN 197-064X E-ISSN 197-0658 Published by Canadian Center of Science and Education Controllability of Complex Power Networks Guohua Zhang 1,

More information

The Gene Modular Detection of Random Boolean Networks by Dynamic Characteristics Analysis

The Gene Modular Detection of Random Boolean Networks by Dynamic Characteristics Analysis Journal of Materials, Processing and Design (2017) Vol. 1, Number 1 Clausius Scientific Press, Canada The Gene Modular Detection of Random Boolean Networks by Dynamic Characteristics Analysis Xueyi Bai1,a,

More information

TCM Health-keeping Proverb English Translation Management Platform based on SQL Server Database

TCM Health-keeping Proverb English Translation Management Platform based on SQL Server Database 2019 2nd International Conference on Computer Science and Advanced Materials (CSAM 2019) TCM Health-keeping Proverb English Translation Management Platform based on SQL Server Database Qiuxia Zeng1, Jianpeng

More information

The Complex Network Phenomena. and Their Origin

The Complex Network Phenomena. and Their Origin The Complex Network Phenomena and Their Origin An Annotated Bibliography ESL 33C 003180159 Instructor: Gerriet Janssen Match 18, 2004 Introduction A coupled system can be described as a complex network,

More information

Combining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating

Combining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating Combining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating Dipak J Kakade, Nilesh P Sable Department of Computer Engineering, JSPM S Imperial College of Engg. And Research,

More information

Information Push Service of University Library in Network and Information Age

Information Push Service of University Library in Network and Information Age 2013 International Conference on Advances in Social Science, Humanities, and Management (ASSHM 2013) Information Push Service of University Library in Network and Information Age Song Deng 1 and Jun Wang

More information

Data mining --- mining graphs

Data mining --- mining graphs Data mining --- mining graphs University of South Florida Xiaoning Qian Today s Lecture 1. Complex networks 2. Graph representation for networks 3. Markov chain 4. Viral propagation 5. Google s PageRank

More information

Empirical Analysis of the Spread of University Students Amative Behavior

Empirical Analysis of the Spread of University Students Amative Behavior Applied Mathematics, 2013, 4, 137-141 http://dx.doi.org/10.4236/am.2013.48a019 Published Online August 2013 (http://www.scirp.org/journal/am) Empirical Analysis of the Spread of University Students Amative

More information

Topologies and Centralities of Replied Networks on Bulletin Board Systems

Topologies and Centralities of Replied Networks on Bulletin Board Systems Topologies and Centralities of Replied Networks on Bulletin Board Systems Qin Sen 1,2 Dai Guanzhong 2 Wang Lin 2 Fan Ming 2 1 Hangzhou Dianzi University, School of Sciences, Hangzhou, 310018, China 2 Northwestern

More information

A priority based dynamic bandwidth scheduling in SDN networks 1

A priority based dynamic bandwidth scheduling in SDN networks 1 Acta Technica 62 No. 2A/2017, 445 454 c 2017 Institute of Thermomechanics CAS, v.v.i. A priority based dynamic bandwidth scheduling in SDN networks 1 Zun Wang 2 Abstract. In order to solve the problems

More information

Research on the Development Law of Smart Phone Screen based on User Experience

Research on the Development Law of Smart Phone Screen based on User Experience Research on the Development Law of Smart Phone Screen based on User Experience Pei Xuesheng 1, 2, a, Wang Yang 2 1 School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, China

More information

Modeling and Analysis of Information Propagation Model of Online/Offline Network Based on Coupled Network

Modeling and Analysis of Information Propagation Model of Online/Offline Network Based on Coupled Network Modeling and Analysis of Information Propagation Model of Online/Offline Network Based on Coupled Network Wanting Qin and Tongrang Fan (B) School of Information Science and Technology, Shijiazhuang Tiedao

More information

Supplementary Information

Supplementary Information 1 2 3 4 5 6 7 8 9 10 11 12 Supplementary Information Competition-Based Benchmarking of Influence Ranking Methods in Social Networks Alexandru Topîrceanu Contents 1 Node overlapping correlation change as

More information

Road Network Traffic Congestion Evaluation Simulation Model based on Complex Network Chao Luo

Road Network Traffic Congestion Evaluation Simulation Model based on Complex Network Chao Luo 6th International Conference on Machinery, Materials, Environment, Biotechnology and Computer (MMEBC 26) Road Network Traffic Congestion Evaluation Simulation Model based on Complex Network Chao Luo Department

More information

Study of Data Mining Algorithm in Social Network Analysis

Study of Data Mining Algorithm in Social Network Analysis 3rd International Conference on Mechatronics, Robotics and Automation (ICMRA 2015) Study of Data Mining Algorithm in Social Network Analysis Chang Zhang 1,a, Yanfeng Jin 1,b, Wei Jin 1,c, Yu Liu 1,d 1

More information

The Establishment of Large Data Mining Platform Based on Cloud Computing. Wei CAI

The Establishment of Large Data Mining Platform Based on Cloud Computing. Wei CAI 2017 International Conference on Electronic, Control, Automation and Mechanical Engineering (ECAME 2017) ISBN: 978-1-60595-523-0 The Establishment of Large Data Mining Platform Based on Cloud Computing

More information

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Study on secure data storage based on cloud computing ABSTRACT KEYWORDS

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Study on secure data storage based on cloud computing ABSTRACT KEYWORDS [Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 22 BioTechnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(22), 2014 [13778-13783] Study on secure data storage based on cloud computing

More information

Learning Network Graph of SIR Epidemic Cascades Using Minimal Hitting Set based Approach

Learning Network Graph of SIR Epidemic Cascades Using Minimal Hitting Set based Approach Learning Network Graph of SIR Epidemic Cascades Using Minimal Hitting Set based Approach Zhuozhao Li and Haiying Shen Dept. of Electrical and Computer Engineering Clemson University, SC, USA Kang Chen

More information

VisoLink: A User-Centric Social Relationship Mining

VisoLink: A User-Centric Social Relationship Mining VisoLink: A User-Centric Social Relationship Mining Lisa Fan and Botang Li Department of Computer Science, University of Regina Regina, Saskatchewan S4S 0A2 Canada {fan, li269}@cs.uregina.ca Abstract.

More information

High Capacity Reversible Watermarking Scheme for 2D Vector Maps

High Capacity Reversible Watermarking Scheme for 2D Vector Maps Scheme for 2D Vector Maps 1 Information Management Department, China National Petroleum Corporation, Beijing, 100007, China E-mail: jxw@petrochina.com.cn Mei Feng Research Institute of Petroleum Exploration

More information

Structural Analysis of Paper Citation and Co-Authorship Networks using Network Analysis Techniques

Structural Analysis of Paper Citation and Co-Authorship Networks using Network Analysis Techniques Structural Analysis of Paper Citation and Co-Authorship Networks using Network Analysis Techniques Kouhei Sugiyama, Hiroyuki Ohsaki and Makoto Imase Graduate School of Information Science and Technology,

More information

The Design and Implementation of Disaster Recovery in Dual-active Cloud Center

The Design and Implementation of Disaster Recovery in Dual-active Cloud Center International Conference on Information Sciences, Machinery, Materials and Energy (ICISMME 2015) The Design and Implementation of Disaster Recovery in Dual-active Cloud Center Xiao Chen 1, a, Longjun Zhang

More information

Open Access Research on Algorithms of Spatial-Temporal Multi-Channel Allocation Based on the Greedy Algorithm for Wireless Mesh Network

Open Access Research on Algorithms of Spatial-Temporal Multi-Channel Allocation Based on the Greedy Algorithm for Wireless Mesh Network Send Orders for Reprints to reprints@benthamscience.ae 690 The Open Electrical & Electronic Engineering Journal, 2014, 8, 690-694 Open Access Research on Algorithms of Spatial-Temporal Multi-Channel Allocation

More information

Research on Quantitative and Semi-Quantitative Training Simulation of Network Countermeasure Jianjun Shen1,a, Nan Qu1,b, Kai Li1,c

Research on Quantitative and Semi-Quantitative Training Simulation of Network Countermeasure Jianjun Shen1,a, Nan Qu1,b, Kai Li1,c 2nd International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2016) Research on Quantitative and Semi-Quantitative Training Simulation of Networ Countermeasure Jianjun

More information

Yunfeng Zhang 1, Huan Wang 2, Jie Zhu 1 1 Computer Science & Engineering Department, North China Institute of Aerospace

Yunfeng Zhang 1, Huan Wang 2, Jie Zhu 1 1 Computer Science & Engineering Department, North China Institute of Aerospace [Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 20 BioTechnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(20), 2014 [12526-12531] Exploration on the data mining system construction

More information

Centrality Book. cohesion.

Centrality Book. cohesion. Cohesion The graph-theoretic terms discussed in the previous chapter have very specific and concrete meanings which are highly shared across the field of graph theory and other fields like social network

More information

The coupling effect on VRTP of SIR epidemics in Scale- Free Networks

The coupling effect on VRTP of SIR epidemics in Scale- Free Networks The coupling effect on VRTP of SIR epidemics in Scale- Free Networks Kiseong Kim iames@kaist.ac.kr Sangyeon Lee lsy5518@kaist.ac.kr Kwang-Hyung Lee* khlee@kaist.ac.kr Doheon Lee* dhlee@kaist.ac.kr ABSTRACT

More information

Agent-Based Simulation of Rumor Propagation on Social Network BasedonActiveImmuneMechanism

Agent-Based Simulation of Rumor Propagation on Social Network BasedonActiveImmuneMechanism Journal of Systems Science and Information Dec., 2017, Vol. 5, No. 6, pp. 571 584 DOI: 10.21078/JSSI-2017-571-14 Agent-Based Simulation of Rumor Propagation on Social Network BasedonActiveImmuneMechanism

More information

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS ABSTRACT Zhang Huijuan and Liu Kai School of Software Engineering, Tongji University, Shanghai, China

More information

An Exploratory Journey Into Network Analysis A Gentle Introduction to Network Science and Graph Visualization

An Exploratory Journey Into Network Analysis A Gentle Introduction to Network Science and Graph Visualization An Exploratory Journey Into Network Analysis A Gentle Introduction to Network Science and Graph Visualization Pedro Ribeiro (DCC/FCUP & CRACS/INESC-TEC) Part 1 Motivation and emergence of Network Science

More information

Phase Transitions in Random Graphs- Outbreak of Epidemics to Network Robustness and fragility

Phase Transitions in Random Graphs- Outbreak of Epidemics to Network Robustness and fragility Phase Transitions in Random Graphs- Outbreak of Epidemics to Network Robustness and fragility Mayukh Nilay Khan May 13, 2010 Abstract Inspired by empirical studies researchers have tried to model various

More information

FSRM Feedback Algorithm based on Learning Theory

FSRM Feedback Algorithm based on Learning Theory Send Orders for Reprints to reprints@benthamscience.ae The Open Cybernetics & Systemics Journal, 2015, 9, 699-703 699 FSRM Feedback Algorithm based on Learning Theory Open Access Zhang Shui-Li *, Dong

More information

Making the most of DCIM. Get to know your data center inside out

Making the most of DCIM. Get to know your data center inside out Making the most of DCIM Get to know your data center inside out What is DCIM? Data Center Infrastructure Management (DCIM) is the discipline of managing the physical infrastructure of a data center and

More information

Complex Networks. Structure and Dynamics

Complex Networks. Structure and Dynamics Complex Networks Structure and Dynamics Ying-Cheng Lai Department of Mathematics and Statistics Department of Electrical Engineering Arizona State University Collaborators! Adilson E. Motter, now at Max-Planck

More information

Building the Multiplex: An Agent-Based Model of Formal and Informal Network Relations

Building the Multiplex: An Agent-Based Model of Formal and Informal Network Relations Building the Multiplex: An Agent-Based Model of Formal and Informal Network Relations EURO 2016 POZNAN POLAND, 4 JULY 2016 Duncan A. Robertson and Leroy White Loughborough University, UK; Warwick Business

More information

A Survey Based on Product Usability and Feature Fatigue Analysis Methods for Online Product

A Survey Based on Product Usability and Feature Fatigue Analysis Methods for Online Product A Survey Based on Product Usability and Feature Fatigue Analysis Methods for Online Product Nirali Patel, Student, CSE, PIET, Vadodara, India Dheeraj Kumar Singh, Assistant Professor, Department of IT,

More information

Models of Network Formation. Networked Life NETS 112 Fall 2017 Prof. Michael Kearns

Models of Network Formation. Networked Life NETS 112 Fall 2017 Prof. Michael Kearns Models of Network Formation Networked Life NETS 112 Fall 2017 Prof. Michael Kearns Roadmap Recently: typical large-scale social and other networks exhibit: giant component with small diameter sparsity

More information

Graph Structure Over Time

Graph Structure Over Time Graph Structure Over Time Observing how time alters the structure of the IEEE data set Priti Kumar Computer Science Rensselaer Polytechnic Institute Troy, NY Kumarp3@rpi.edu Abstract This paper examines

More information

Minimal Test Cost Feature Selection with Positive Region Constraint

Minimal Test Cost Feature Selection with Positive Region Constraint Minimal Test Cost Feature Selection with Positive Region Constraint Jiabin Liu 1,2,FanMin 2,, Shujiao Liao 2, and William Zhu 2 1 Department of Computer Science, Sichuan University for Nationalities, Kangding

More information

Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm

Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm Saiyad Sharik Kaji Prof.M.B.Chandak WCOEM, Nagpur RBCOE. Nagpur Department of Computer Science, Nagpur University, Nagpur-441111

More information

Context-based Roles and Competencies of Data Curators in Supporting Data Lifecycle: Multi-Case Study in China

Context-based Roles and Competencies of Data Curators in Supporting Data Lifecycle: Multi-Case Study in China Submitted on: 29.05.2017 Context-based Roles and Competencies of Data Curators in Supporting Data Lifecycle: Multi-Case Study in China Zhenjia Fan Department of Information Resources Management, Business

More information

Website Designs Australia

Website Designs Australia Proudly Brought To You By: Website Designs Australia Contents Disclaimer... 4 Why Your Local Business Needs Google Plus... 5 1 How Google Plus Can Improve Your Search Engine Rankings... 6 1. Google Search

More information

Wednesday, March 8, Complex Networks. Presenter: Jirakhom Ruttanavakul. CS 790R, University of Nevada, Reno

Wednesday, March 8, Complex Networks. Presenter: Jirakhom Ruttanavakul. CS 790R, University of Nevada, Reno Wednesday, March 8, 2006 Complex Networks Presenter: Jirakhom Ruttanavakul CS 790R, University of Nevada, Reno Presented Papers Emergence of scaling in random networks, Barabási & Bonabeau (2003) Scale-free

More information

Characteristics of Preferentially Attached Network Grown from. Small World

Characteristics of Preferentially Attached Network Grown from. Small World Characteristics of Preferentially Attached Network Grown from Small World Seungyoung Lee Graduate School of Innovation and Technology Management, Korea Advanced Institute of Science and Technology, Daejeon

More information

Analysis and Research on Improving Real-time Performance of Linux Kernel

Analysis and Research on Improving Real-time Performance of Linux Kernel Analysis and Research on Improving Real-time Performance of Linux Kernel BI Chun-yue School of Electronics and Computer/ Zhejiang Wanli University/Ningbo, China ABSTRACT With the widespread application

More information

Excavation Balance Routing Algorithm Simulation Based on Fuzzy Ant Colony

Excavation Balance Routing Algorithm Simulation Based on Fuzzy Ant Colony 2018 5th International Conference on Electrical & Electronics Engineering and Computer Science (ICEEECS 2018) Excavation Balance Routing Algorithm Simulation Based on Fuzzy Ant Colony Luo Xiaojuan, Yan

More information

An Evolving Network Model With Local-World Structure

An Evolving Network Model With Local-World Structure The Eighth International Symposium on Operations Research and Its Applications (ISORA 09) Zhangjiajie, China, September 20 22, 2009 Copyright 2009 ORSC & APORC, pp. 47 423 An Evolving Network odel With

More information

Udaipur, Rajasthan, India. University, Udaipur, Rajasthan, India

Udaipur, Rajasthan, India. University, Udaipur, Rajasthan, India ROLE OF NETWORK VIRTUALIZATION IN CLOUD COMPUTING AND NETWORK CONVERGENCE 1 SHAIKH ABDUL AZEEM, 2 SATYENDRA KUMAR SHARMA 1 Research Scholar, Department of Computer Science, Pacific Academy of Higher Education

More information

Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous Vehicular Cloud

Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous Vehicular Cloud 2016 International Conference on Service Science, Technology and Engineering (SSTE 2016) ISBN: 978-1-60595-351-9 Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous

More information

Analysis on computer network viruses and preventive measures

Analysis on computer network viruses and preventive measures International Symposium on Computers & Informatics (ISCI 2015) Analysis on computer network viruses and preventive measures Yongbin ZHU Engineering College, Honghe University, Mengzi 661100, Yunnan, China

More information

Competitive Intelligence and Web Mining:

Competitive Intelligence and Web Mining: Competitive Intelligence and Web Mining: Domain Specific Web Spiders American University in Cairo (AUC) CSCE 590: Seminar1 Report Dr. Ahmed Rafea 2 P age Khalid Magdy Salama 3 P age Table of Contents Introduction

More information

AN EFFICIENT DEADLOCK DETECTION AND RESOLUTION ALGORITHM FOR GENERALIZED DEADLOCKS. Wei Lu, Chengkai Yu, Weiwei Xing, Xiaoping Che and Yong Yang

AN EFFICIENT DEADLOCK DETECTION AND RESOLUTION ALGORITHM FOR GENERALIZED DEADLOCKS. Wei Lu, Chengkai Yu, Weiwei Xing, Xiaoping Che and Yong Yang International Journal of Innovative Computing, Information and Control ICIC International c 2017 ISSN 1349-4198 Volume 13, Number 2, April 2017 pp. 703 710 AN EFFICIENT DEADLOCK DETECTION AND RESOLUTION

More information

Research on Visual Design Based on Mobile Internet - Taking E-book APP as an Example Wei Liu1, a

Research on Visual Design Based on Mobile Internet - Taking E-book APP as an Example Wei Liu1, a Advances in Computer Science Research (ACSR), volume 73 7th International Conference on Education, Management, Information and Computer Science (ICEMC 2017) Research on Visual Design Based on Mobile Internet

More information

Taccumulation of the social network data has raised

Taccumulation of the social network data has raised International Journal of Advanced Research in Social Sciences, Environmental Studies & Technology Hard Print: 2536-6505 Online: 2536-6513 September, 2016 Vol. 2, No. 1 Review Social Network Analysis and

More information

Automatic Shadow Removal by Illuminance in HSV Color Space

Automatic Shadow Removal by Illuminance in HSV Color Space Computer Science and Information Technology 3(3): 70-75, 2015 DOI: 10.13189/csit.2015.030303 http://www.hrpub.org Automatic Shadow Removal by Illuminance in HSV Color Space Wenbo Huang 1, KyoungYeon Kim

More information

Time Series Clustering Ensemble Algorithm Based on Locality Preserving Projection

Time Series Clustering Ensemble Algorithm Based on Locality Preserving Projection Based on Locality Preserving Projection 2 Information & Technology College, Hebei University of Economics & Business, 05006 Shijiazhuang, China E-mail: 92475577@qq.com Xiaoqing Weng Information & Technology

More information

Problems and Countermeasures of Information Security of Electric. Power Enterprises in China

Problems and Countermeasures of Information Security of Electric. Power Enterprises in China 6th International Conference on Machinery, Materials, Environment, Biotechnology and Computer (MMEBC 2016) Problems and Countermeasures of Information Security of Electric Power Enterprises in China Haixun

More information

Optimizing the Revenue of Spotify with a new Pricing Scheme (MCM Problem 2)

Optimizing the Revenue of Spotify with a new Pricing Scheme (MCM Problem 2) Optimizing the Revenue of Spotify with a new Pricing Scheme (MCM Problem 2) November 4, 2018 Contents Non-technical Summary 1 1. Introduction 2 2. Assumption 3 3. Model 5 4. Data Presentation 13 5. Result

More information

Research and Application of E-Commerce Recommendation System Based on Association Rules Algorithm

Research and Application of E-Commerce Recommendation System Based on Association Rules Algorithm Research and Application of E-Commerce Recommendation System Based on Association Rules Algorithm Qingting Zhu 1*, Haifeng Lu 2 and Xinliang Xu 3 1 School of Computer Science and Software Engineering,

More information

Research on Community Structure in Bus Transport Networks

Research on Community Structure in Bus Transport Networks Commun. Theor. Phys. (Beijing, China) 52 (2009) pp. 1025 1030 c Chinese Physical Society and IOP Publishing Ltd Vol. 52, No. 6, December 15, 2009 Research on Community Structure in Bus Transport Networks

More information

Modeling of Complex Social. MATH 800 Fall 2011

Modeling of Complex Social. MATH 800 Fall 2011 Modeling of Complex Social Systems MATH 800 Fall 2011 Complex SocialSystems A systemis a set of elements and relationships A complex system is a system whose behavior cannot be easily or intuitively predicted

More information

Framework Research on Privacy Protection of PHR Owners in Medical Cloud System Based on Aggregation Key Encryption Algorithm

Framework Research on Privacy Protection of PHR Owners in Medical Cloud System Based on Aggregation Key Encryption Algorithm Framework Research on Privacy Protection of PHR Owners in Medical Cloud System Based on Aggregation Key Encryption Algorithm Huiqi Zhao 1,2,3, Yinglong Wang 2,3*, Minglei Shu 2,3 1 Department of Information

More information

How Infections Spread on Networks CS 523: Complex Adaptive Systems Assignment 4: Due Dec. 2, :00 pm

How Infections Spread on Networks CS 523: Complex Adaptive Systems Assignment 4: Due Dec. 2, :00 pm 1 Introduction How Infections Spread on Networks CS 523: Complex Adaptive Systems Assignment 4: Due Dec. 2, 2015 5:00 pm In this assignment you will investigate the spread of disease on networks. In class

More information

Integration of information security and network data mining technology in the era of big data

Integration of information security and network data mining technology in the era of big data Acta Technica 62 No. 1A/2017, 157 166 c 2017 Institute of Thermomechanics CAS, v.v.i. Integration of information security and network data mining technology in the era of big data Lu Li 1 Abstract. The

More information

An Overview of Web Accessibility Evaluation of Government Websites in China Liang-cheng LI, Jia-jun BU*, Zhi YU, Wei WANG and Can WANG

An Overview of Web Accessibility Evaluation of Government Websites in China Liang-cheng LI, Jia-jun BU*, Zhi YU, Wei WANG and Can WANG 2016 2 nd International Conference on Social Science and Development (ICSSD 2016) ISBN: 978-1-60595-356-4 An Overview of Web Accessibility Evaluation of Government Websites in China Liang-cheng LI, Jia-jun

More information

A Study on Website Quality Models

A Study on Website Quality Models International Journal of Scientific and Research Publications, Volume 4, Issue 12, December 2014 1 A Study on Website Quality Models R.Anusha Department of Information Systems Management, M.O.P Vaishnav

More information

Aero-engine PID parameters Optimization based on Adaptive Genetic Algorithm. Yinling Wang, Huacong Li

Aero-engine PID parameters Optimization based on Adaptive Genetic Algorithm. Yinling Wang, Huacong Li International Conference on Applied Science and Engineering Innovation (ASEI 215) Aero-engine PID parameters Optimization based on Adaptive Genetic Algorithm Yinling Wang, Huacong Li School of Power and

More information

Innovation Infrastructure Partnership

Innovation Infrastructure Partnership Innovation Infrastructure Partnership Vision The Innovation Infrastructure Partnership s vision is to support the creation, adoption and commercialisation of new technologies, helping UK companies to gain

More information

Handling Multi Objectives of with Multi Objective Dynamic Particle Swarm Optimization

Handling Multi Objectives of with Multi Objective Dynamic Particle Swarm Optimization Handling Multi Objectives of with Multi Objective Dynamic Particle Swarm Optimization Richa Agnihotri #1, Dr. Shikha Agrawal #1, Dr. Rajeev Pandey #1 # Department of Computer Science Engineering, UIT,

More information

Community-Based Adaptive Buffer Management Strategy in Opportunistic Network

Community-Based Adaptive Buffer Management Strategy in Opportunistic Network Community-Based Adaptive Buffer Management Strategy in Opportunistic Network Junhai Zhou, Yapin Lin ( ), Siwang Zhou, and Qin Liu College of Computer Science and Electronic Engineering, Hunan University,

More information

A Personalized Cloud Services Recommendation Based on Cooperative Relationship between Services

A Personalized Cloud Services Recommendation Based on Cooperative Relationship between Services Journal of Software Engineering and Applications, 2013, 6, 623-629 Published Online December 2013 (http://www.scirp.org/ournal/sea) http://dx.doi.org/10.4236/sea.2013.612074 623 A Personalized Cloud Services

More information

A Random Forest based Learning Framework for Tourism Demand Forecasting with Search Queries

A Random Forest based Learning Framework for Tourism Demand Forecasting with Search Queries University of Massachusetts Amherst ScholarWorks@UMass Amherst Tourism Travel and Research Association: Advancing Tourism Research Globally 2016 ttra International Conference A Random Forest based Learning

More information

The Coral Project: Defending against Large-scale Attacks on the Internet. Chenxi Wang

The Coral Project: Defending against Large-scale Attacks on the Internet. Chenxi Wang 1 The Coral Project: Defending against Large-scale Attacks on the Internet Chenxi Wang chenxi@cmu.edu http://www.ece.cmu.edu/coral.html The Motivation 2 Computer viruses and worms are a prevalent threat

More information

Model the P2P Attack in Computer Networks

Model the P2P Attack in Computer Networks International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2015) Model the P2P Attack in Computer Networks Wei Wang * Science and Technology on Communication Information

More information

Supplementary material to Epidemic spreading on complex networks with community structures

Supplementary material to Epidemic spreading on complex networks with community structures Supplementary material to Epidemic spreading on complex networks with community structures Clara Stegehuis, Remco van der Hofstad, Johan S. H. van Leeuwaarden Supplementary otes Supplementary ote etwork

More information

Quality Assessment of Power Dispatching Data Based on Improved Cloud Model

Quality Assessment of Power Dispatching Data Based on Improved Cloud Model Quality Assessment of Power Dispatching Based on Improved Cloud Model Zhaoyang Qu, Shaohua Zhou *. School of Information Engineering, Northeast Electric Power University, Jilin, China Abstract. This paper

More information

The Microblogging Evolution Based on User's Popularity

The Microblogging Evolution Based on User's Popularity Send Orders for Reprints to reprints@benthamscience.ae The Open Cybernetics & Systemics Journal, 2015, 9, 2703-2708 2703 The Microblogging Evolution Based on User's Popularity Open Access Tao Shaohua *

More information

ICT-U CAMEROON, P.O. Box 526 Yaounde, Cameroon. Schools and Programs DETAILED ICT-U PROGRAMS AND CORRESPONDING CREDIT HOURS

ICT-U CAMEROON, P.O. Box 526 Yaounde, Cameroon. Schools and Programs DETAILED ICT-U PROGRAMS AND CORRESPONDING CREDIT HOURS Website: http:// ICT-U CAMEROON, P.O. Box 526 Yaounde, Cameroon Schools and Programs DETAILED ICT-U PROGRAMS AND CORRESPONDING CREDIT HOURS Important note on English as a Second Language (ESL) and International

More information

Study on A Recommendation Algorithm of Crossing Ranking in E- commerce

Study on A Recommendation Algorithm of Crossing Ranking in E- commerce International Journal of u-and e-service, Science and Technology, pp.53-62 http://dx.doi.org/10.14257/ijunnesst2014.7.4.6 Study on A Recommendation Algorithm of Crossing Ranking in E- commerce Duan Xueying

More information

M.E.J. Newman: Models of the Small World

M.E.J. Newman: Models of the Small World A Review Adaptive Informatics Research Centre Helsinki University of Technology November 7, 2007 Vocabulary N number of nodes of the graph l average distance between nodes D diameter of the graph d is

More information

Lesson 4. Random graphs. Sergio Barbarossa. UPC - Barcelona - July 2008

Lesson 4. Random graphs. Sergio Barbarossa. UPC - Barcelona - July 2008 Lesson 4 Random graphs Sergio Barbarossa Graph models 1. Uncorrelated random graph (Erdős, Rényi) N nodes are connected through n edges which are chosen randomly from the possible configurations 2. Binomial

More information

The Design of Supermarket Electronic Shopping Guide System Based on ZigBee Communication

The Design of Supermarket Electronic Shopping Guide System Based on ZigBee Communication The Design of Supermarket Electronic Shopping Guide System Based on ZigBee Communication Yujie Zhang, Liang Han, and Yuanyuan Zhang College of Electrical and Information Engineering, Shaanxi University

More information

Administration of Interconnection between Networks and Faced Issues. Wang Jian

Administration of Interconnection between Networks and Faced Issues. Wang Jian Administration of Interconnection between Networks and Faced Issues Wang Jian Jiangsu Communications Administration (JSCA) August, 2002 1 Contents Goals of Interconnection Successful Factors for Interconnection

More information

Comprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority

Comprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority IOP Conference Series: Earth and Environmental Science PAPER OPEN ACCESS Comprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority To cite this article:

More information

Chapter 1. Social Media and Social Computing. October 2012 Youn-Hee Han

Chapter 1. Social Media and Social Computing. October 2012 Youn-Hee Han Chapter 1. Social Media and Social Computing October 2012 Youn-Hee Han http://link.koreatech.ac.kr 1.1 Social Media A rapid development and change of the Web and the Internet Participatory web application

More information

Research Article An Improved Topology-Potential-Based Community Detection Algorithm for Complex Network

Research Article An Improved Topology-Potential-Based Community Detection Algorithm for Complex Network e Scientific World Journal, Article ID 121609, 7 pages http://dx.doi.org/10.1155/2014/121609 Research Article An Improved Topology-Potential-Based Community Detection Algorithm for Complex Network Zhixiao

More information